Security trends for 2014

MarketingTrends2014.jpg

2014 started off with huge retail outlets in the US disclosing major data breaches and identity theft. With so much focus on Enterprise security in 2013 and so many new products, solutions, and acquisitions in the cyber security space, the world has become a safer place. Most of the security vendors and markets are continuing the momentum in 2014 that had existed in 2013.

 

 

Cyberborders:

 

In 2013, we saw the Internet begin to become fragmented and segmented. Countries were starting to look into creating Cyberborders to protect national information. In 2014, we will see the borderless Internet become filled with borders as the government in other countries try to secure the Internet.

 

Mobile-device specifc malware:

 

With an increase in people starting to store sensitive information on their phones, we will see smarter, more portable malware intended to hack information. In return, users will have to start protecting their phones, tablets, and other devices. Even further ,people will have to start considering protecting their mundane objects like thermostats. Many devices are now linked with Wifi and store sensitive information such as passwords and financial information. 

Cyber Security Insurance: 


Corporations will begin taking out Cyber Security insurance to help them in events like the recent Target credit card hacks. 

Crown Jewel Security: 

Instead of taking on complicated data classification initiatives across the enterprise, organizations are quickly identifying their most valuable data and then surrounding it with enhanced safeguards like multi-factor authentication, privileged user security, granular access controls, encryption/key management, and continuous monitoring. They call this "Crown Jewel Security," and in 2014, we can expect to see a lot of it. 

Encryption will be key: 


The heightened awareness of, and revelations on surveillance, will be a driver for companies to tighten up security and develop ways to protect their data from decryption. Next year could see more changes in the way that new encryption technologies are deployed; Yahoo recently announced that it is to encrypt users’ data and most recently tech giants including Yahoo, Google, Apple and Facebook have joined forces to call for reforms that would allow them to resist unreasonable demands for customer data. 

 

User Controlled Explosion:

 

In the upcoming months, numerous service providers will launch solutions and services to avoid censorship and Internet monitoring. The services will allow users to control encryption processes in a transparent way: the users will be the unique manager for their encryption keys with the dual advantage that users will not doubt the encryption management operated by providers, and service providers will not be liable for content posted by users. 

Changes in cloud technology: 


One prediction for cloud development is that the industry will continue to use the Infrastructure as a Service (IaaS) path. However, chief information officers will look at the costs and benefits of IaaS and opt for a method that costs less to operate. In the same vein, IT directors believe there is a lot to gain from the Platform-as-a-service (PaaS) path. 

 

See what HP is working with these trends and how it is keeping your enterprises safe from bad guys here: www.hp.com/go/EnterpriseSecurity

Comments
Andy Houghton | ‎01-21-2014 11:34 PM

Here's a short video going over some of the basics about information security, but also points out that a lot of information security is about being more aware of the risks and our attitude towards those risks http://youtu.be/eUxUUarTRW4 

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
Featured


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.